网友您好, 请在下方输入框内输入要搜索的题目:

题目内容 (请给出正确答案)
单选题
You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL> DROP PROFILE app_user;  Which statement describes the result()
A

The command produces an error.

B

The profile is dropped and current user sessions use the DEFAULT profile immediately.

C

The profile is dropped and only the subsequent user sessions use the DEFAULT profile.

D

The profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.


参考答案

参考解析
解析: 暂无解析
更多 “单选题You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL DROP PROFILE app_user;  Which statement describes the result()A The command produces an error.B The profile is dropped and current user sessions use the DEFAULT profile immediately.C The profile is dropped and only the subsequent user sessions use the DEFAULT profile.D The profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.” 相关考题
考题 In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time.How would you accomplish this?() A. Setting a metric thresholdB. Implementing Database Resource ManagerC. Enabling resumable timeout for user sessionsD. Decreasing the value of the IDLE_TIME resource limit in the default profile

考题 In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A、By assigning profiles for the usersB、By implementing Fine-Grained Auditing (FGA)C、By granting a secure application role to the usersD、By implementing the Database Resource Manager plan

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a database named DB1 in the instance. When you are absent, a user will use a login named Mary to log in and maintain the database snapshots. The user has to delete the database snapshots for DB1, so you have to give the appropriate permissions to the user.  So which database permission should you give the user?()  A、DELETE B、CONTROL C、DROP DATABASE D、ALTER ANY DATASPACE

考题 You execute the following command to audit database activities: SQL AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL; What is the effect of this command()A、One audit record is created for every successful DROP TABLE command executed in the session of SCOTT.B、One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to otherusers.C、One audit record is created for the whole session if user SCOTT successfully drops one or more tables inhis session.D、One audit record is created for every session of any other user in which a table owned by SCOTT isdropped successfully.E、One audit record is created for every successful DROP TABLE command executed by any user to drop Tables owned by SCOTT

考题 You want to drop the TBS1 tablespace from your database.  You also want to delete the corresponding data files automatically, and not have to do it manually.  What should you do?()A、Use the DROP DATAFILE command.B、Use the DROP TABLESPACE command.C、Ensure that all database files are Oracle Managed Files before using the DROP TABLESPACE command.D、Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the DROP TABLESPACE command.

考题 In your database, the users SYS and SYSTEM have been assigned the profiles, ADMIN_PROF1 and ADMIN_PROF2, respectively. The rest of the database administrators are assigned the profile ADMIN_PROF3. You create a profile, USER_PROF, and assign it to the application user, Adams. After a week you realize that the profile is no longer required and you decide to drop it. What will Adam’s profile be after the USER_PROF profile has been dropped?()A、no profilesB、the default profileC、same as the profile of SYS userD、same as the profile of SYSTEM user

考题 You created a profile APP_USER and assigned it to the users. After a month, you decide to drop theprofile.Some user sessions are currently connected to the database instance and are using the APP_USERprofile. This command is used to drop the profile: SQL DROP PROFILE app_user;  Which statement describes the result()A、The command produces an error.B、The profile is dropped and current user sessions use the DEFAULT profile immediately.C、The profile is dropped and only the subsequent user sessions use the DEFAULT profile.D、The profile is dropped, the sessions are terminated, and the subsequent user sessions use theDEFAULT profile.

考题 In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A、by assigning profiles for the usersB、by implementing Fine-Grained Auditing (FGA)C、by granting a secure application role to the usersD、by implementing the Database Resource Manager plan

考题 You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A、From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B、From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C、Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D、Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 You are responsible for Company's network.  You have been assigned the task to create and deploy a standard Windows 2000 Professional image to 1,000 new client computers in the Company's main office. You log on to a client computer named DuplicateTK by using the local administrator account. You install three Windows 2000 Professional compatible software packages on DuplicateTK. After the software installations are done you create an image with a third-party imaging software. You deploy the image to a test client computer and join the client to a domain. When you log on to the test computer by using a domain user account, the new applications do not appear in the start menu. You need to be able to re-create the image to include the applications in the Start menu for all users.  What action should you take on DuplicateTK?()A、Allow the local Users group Read  Execute permission on the parent folder that contains the applications.B、Run the change user / install command, and the run the change user / execute command.C、Reinstall the applications by using the Control Panel, Add/Remove Program wizard.D、Copy the local administrators profile over the default user profile.

考题 You are the desktop administrator for your company. Tom is a user in the company's accounting department. Tom uses a Windows XP Professional portable computer. Tom reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Tom's docking station. Tom reports that the error message does not appear when the computer is docked. You need to ensure that the error does not occur on Tom's computer. You also need to ensure that the storage device continues to function correctly when Tom's computer is docked. What should you do?() A、Remove the storage device from the hardware profile on Tom's computer.B、Create a local user account for Tom on his computer. C、Copy the JZXDRV.dll file to the profile folder for Tom's local user account. Instruct Tom to log on to his computer by using his local user account whenever the computer is undocked.D、Copy the computer's default hardware profile to create a new hardware profile named Undocked. Remove the storage device from the Undocked hardware profile. E、Copy the computer's default hardware profile to create a new hardware profile named Undocked. Disable the storage device in the Undocked hardware profile. F、Instruct Tom to start the computer by using the Undocked hardware profile whenever the computer is undocked.

考题 You are the desktop administrator for Company. Janos is a user in Company's accounting department.  Janos uses a Windows 2000 Professional portable computer.  Janos reports that when the computer is unlocked, it randomly displays the following error message:  "JZXDRV.dll failed to load". You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Janos’ docking station. Janos reports that the error message does not appear when the computer is docked.  You need to ensure that the error does not occur on Janos’ computer. You also need to ensure that the storage device continues to function correctly when Janos’ computer is docked.  What should you do?()A、 Remove the storage device from the hardware profile on Janos’ computer.B、 Create a local user account for Janos on his computer. Copy the JZXDRV.dll file to the profile      folder for Janos’ local user account. Instruct Janos to log on to his computer by using his local      user account whenever the computer is unlocked.C、 Copy the computer's default hardware profile to create a new hardware profile named        Undocked.      Remove the storage device from the Undocked hardware profile.D、 Copy the computer's default hardware profile to create a new hardware profile named       Unlocked. Disable the storage device in the Undocked hardware profile. Instruct Janos to start         the computer by using the Undocked hardware profile whenever the computer is undocked. 

考题 You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?()  A、Another SMTP account should be added to the existing Database Mail profile B、When you send the reports to the manager, you should use the @importance = high parameter. C、You should change the Account Retry Attempts option of the Database Mail system properties D、You should configure a new Database Mail profile. The new one will be used for sending the reports to the manager. 

考题 单选题In your database instance, the user sessions are connected to the database server from the remote machines.You want to achieve the following for these users: 1. The user account must be locked after four unsuccessful login attempts. 2. The user must be prompted to change the password at regular intervals. 3. The user may not have more than three simultaneous sessions. 4. The user session must automatically be logged off if more than 10 minutes elapsed time used. How would you accomplish the above()A By assigning profiles for the usersB By implementing Fine-Grained Auditing (FGA)C By granting a secure application role to the usersD By implementing the Database Resource Manager plan

考题 单选题You are a Database Administrator with TXGlobal. You use a password file to establish remote connections to the HR database on the server located at the home office. Currently, two active remote sessions exist to this database. These sessions were established using the SYSDBA privilege from the remote machines. You accidentally deleted the password file. What will be the consequence of this action?()A  Both the sessions will be killed, and no new sessions will be created using the SYSDBA or SYSOPER privilege.B  Both the sessions will remain active, but no new sessions will be created using the SYSDBA or SYSOPER privilege.C Both the sessions will be killed, but new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.D  The database will crash, and no new sessions will be created using the SYSDBA or SYSOPER privilege when the database restarts.

考题 单选题In your database instance, the user sessions are connected to the database server from the remotemachines. You want to achieve the following for these users:  1:The user account must be locked after four unsuccessful login attempts.PASSWORD_LOCK_TIME  2:The user must be prompted to change the password at regular intervals.PASSWORD_LIFE_TIME  3:The user may not have more than three simultaneous sessions.SESSIONS_PER_USER  4:The user session must automatically be logged off if more than 10 minutes elapsed time used.CONNECT_TIME  How would you accomplish the above()A by assigning profiles for the usersB by implementing Fine-Grained Auditing (FGA)C by granting a secure application role to the usersD by implementing the Database Resource Manager plan

考题 单选题You are the administrator of a Windows 2000 Professional portable computer that is shared by users in the sales department.  You want to configure a roaming user profile for each user. You want each individual user profile setting to be available from any location, including by using a dial-up connection.  You log on to the computer by using the local Administrator account. You create user accounts for the users in the sales department. When you attempt to configure each individual user account profile to be a roaming profile, you find that you cannot. You receive the change Profile Type dialog box as shown in the exhibit (Click the Exhibit button)  You want to be able to configure each user account to use a roaming user profile. What should you do?( )A From System in Control Panel, select the Change Type option, and then select the Roaming profile option. B From Users and passwords in Control Panel, select the Advanced tab, and then define the path for the profile location. C Use the Network Connection wizard to create a virtual private network (VPN) connection to the network, and define the mandatory profile path on each domain user account. D Connect the portable computer to the network, and configure the user accounts for a roaming user profile.

考题 单选题After executing the command alter diskgroup disk group2 drop disk dg2a; you issue the following command from the ASM instance:   Select group_number, count(*) from v$asm_operation;   What is the implication if the query against V$ASM_OPERATION returns zero rows?()A  The drop disk operation is still proceeding and you cannot yet run the undrop disks operation.B  The drop disk operation is complete and you can run the undrop disks command if needed.C  The drop disk operation is complete and you cannot run the undrop disk command.D  The query will fail since there is not a V$ASM_OPERATION view available in an ASM instance. E  None of the above is true.

考题 单选题You work in a company which uses SQL Server 2008. You are the administrator of the company database. Now you are in charge of a SQL Server 2008 instance. There is a single Database Mail profile. Reports are sent to all the company employees by using the Mail profile. During office hours, a large volume of reports are sent by the sp_send_dbmail stored procedure. Now you notice that it takes a long time for the reports to be sent to the company manager. As the technical support, you have to speed up the delivery. So what action should you perform to achieve this goal?()A Another SMTP account should be added to the existing Database Mail profile B When you send the reports to the manager, you should use the @importance = high parameter. C You should change the Account Retry Attempts option of the Database Mail system properties D You should configure a new Database Mail profile. The new one will be used for sending the reports to the manager. 

考题 单选题You are the desktop administrator for your company. Tom is a user in the company's accounting department. Tom uses a Windows XP Professional portable computer. Tom reports that when the computer is undocked, it randomly displays the following error message: "JZXDRV.DLL failed to load." You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Tom's docking station. Tom reports that the error message does not appear when the computer is docked. You need to ensure that the error does not occur on Tom's computer. You also need to ensure that the storage device continues to function correctly when Tom's computer is docked. What should you do?()A Remove the storage device from the hardware profile on Tom's computer.B Create a local user account for Tom on his computer. C Copy the JZXDRV.dll file to the profile folder for Tom's local user account. Instruct Tom to log on to his computer by using his local user account whenever the computer is undocked.D Copy the computer's default hardware profile to create a new hardware profile named Undocked. Remove the storage device from the Undocked hardware profile. E Copy the computer's default hardware profile to create a new hardware profile named Undocked. Disable the storage device in the Undocked hardware profile. F Instruct Tom to start the computer by using the Undocked hardware profile whenever the computer is undocked.

考题 单选题In your database, the users SYS and SYSTEM have been assigned the profiles, ADMIN_PROF1 and ADMIN_PROF2, respectively. The rest of the database administrators are assigned the profile ADMIN_PROF3. You create a profile, USER_PROF, and assign it to the application user, Adams. After a week you realize that the profile is no longer required and you decide to drop it. What will Adam’s profile be after the USER_PROF profile has been dropped?()A no profilesB the default profileC same as the profile of SYS userD same as the profile of SYSTEM user

考题 单选题In your database, you want to ensure that idle sessions that are blocking active are automatically terminated after a specified period of time. How would you accomplish this?()A Setting a metric thresholdB Implementing Database Resource ManagerC Enabling resumable timeout for user sessionsD Decreasing the value of the IDLE_TIME resource limit in the default profile

考题 单选题You execute the following command to audit the database activities:  SQL AUDIT DROP ANY TABLE BY scott BY SESSION WHENEVER SUCCESSFUL;  What is the effect of this command?()A One audit record is created for the whole session if user SCOTT successfully drops one or more tables in his session.B One audit record is created for every session when any user successfully drops a table owned by SCOTT.C One audit record is created for each successful DROP TABLE command executed by any user to drop tables owned by SCOTT.D One audit record is generated for the session when SCOTT grants the DROP ANY TABLE privilege to other users in his session.E One audit record is created for each successful DROP TABLE command executed in the session of SCOTT.

考题 单选题On Monday, you dropped the DEPT table from your schema and then you re-created the DEPT table in your schema. On Wednesday, you have a requirement to restore the DEPT table from the recycle bin. Which statement is correct?()A  You cannot restore the DEPT table by using the Oracle Flashback Drop feature because a table with the name DEPT already exists in your schema.B  You can restore the DEPT table by using the Oracle Flashback Drop feature, provided you use the RENAME TO clause.C  You cannot restore the DEPT table by using the Oracle Flashback Drop feature because the contents of the recycle bin are purged every 12 hours by default.D  You can restore the DEPT table by using the Oracle Flashback Drop feature and a system-generated name will be assigned to the restored table.

考题 单选题You want to drop the TBS1 tablespace from your database.  You also want to delete the corresponding data files automatically, and not have to do it manually.  What should you do?()A Use the DROP DATAFILE command.B Use the DROP TABLESPACE command.C Ensure that all database files are Oracle Managed Files before using the DROP TABLESPACE command.D Ensure that the DB_FILE_CREATE_DEST initialization parameter is set before using the DROP TABLESPACE command.

考题 单选题You are the desktop administrator for Company. Janos is a user in Company's accounting department.  Janos uses a Windows 2000 Professional portable computer.  Janos reports that when the computer is unlocked, it randomly displays the following error message:  "JZXDRV.dll failed to load". You discover that the JZXDRV.dll file is used by the device driver for an external storage device that is connected to Janos’ docking station. Janos reports that the error message does not appear when the computer is docked.  You need to ensure that the error does not occur on Janos’ computer. You also need to ensure that the storage device continues to function correctly when Janos’ computer is docked.  What should you do?()A  Remove the storage device from the hardware profile on Janos’ computer.B  Create a local user account for Janos on his computer. Copy the JZXDRV.dll file to the profile      folder for Janos’ local user account. Instruct Janos to log on to his computer by using his local      user account whenever the computer is unlocked.C  Copy the computer's default hardware profile to create a new hardware profile named        Undocked.      Remove the storage device from the Undocked hardware profile.D  Copy the computer's default hardware profile to create a new hardware profile named       Unlocked. Disable the storage device in the Undocked hardware profile. Instruct Janos to start         the computer by using the Undocked hardware profile whenever the computer is undocked. 

考题 单选题You are responsible for Company's network.  You have been assigned the task to create and deploy a standard Windows 2000 Professional image to 1,000 new client computers in the Company's main office. You log on to a client computer named DuplicateTK by using the local administrator account. You install three Windows 2000 Professional compatible software packages on DuplicateTK. After the software installations are done you create an image with a third-party imaging software. You deploy the image to a test client computer and join the client to a domain. When you log on to the test computer by using a domain user account, the new applications do not appear in the start menu. You need to be able to re-create the image to include the applications in the Start menu for all users.  What action should you take on DuplicateTK?()A Allow the local Users group Read  Execute permission on the parent folder that contains the applications.B Run the change user / install command, and the run the change user / execute command.C Reinstall the applications by using the Control Panel, Add/Remove Program wizard.D Copy the local administrators profile over the default user profile.